Chinese Cyber Cod...
Follow
Find
45.3K views | +1 today
Chinese Cyber Code Conflict
Chinese Cyber Code Conflict
Your new post is loading...
Your new post is loading...
Scooped by Red-DragonRising
Scoop.it!

Intelligence brief: Recent nuclear-related developments at the Parchin military complex, Iran | Open Briefing

Intelligence brief: Recent nuclear-related developments at the Parchin military complex, Iran | Open Briefing | Chinese Cyber Code Conflict | Scoop.it
Open Briefing is the world’s first civil society intelligence agency; a collaborative platform for insight and analysis of key defence, security and foreign policy issues.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

China's space activities raising U.S. satellite security concerns

China's <中華人民共和國> space activities raising U.S. satellite security concerns | Chinese Cyber Code Conflict | Scoop.it
WASHINGTON (Reuters) - The United States is concerned about China's expanding ability to disrupt the most sensitive U.S.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Anonymous Petitioning White House To Make DDoS Legal Form Of Protest | TechWeekEurope UK

Anonymous wants to have DDoS legalised as a legal form of protest in the US, so it starts up a petition on the White House website
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Online Propagandist and Fixer to Former Chinese Security Czar Arrested | Regime | China | Epoch Times

Online Propagandist and Fixer to Former Chinese Security Czar Arrested | Regime | China | Epoch Times | Chinese Cyber Code Conflict | Scoop.it
A chief lieutenant of Zhou Yongkang, the former security czar, has been put under detention and investigated as part of an internal Party disciplinary procedure.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

華爾街日報:習近平的真正敵人 - 大紀元 (Wall Street Journal: Xi Jinping real enemy of CPC}

華爾街日報:習近平的真正敵人 - 大紀元 (Wall Street Journal: Xi Jinping real enemy of CPC} | Chinese Cyber Code Conflict | Scoop.it
(大紀元記者秦雨霏編譯報導)《南方週末》反對審查的抗議和共產黨的適度讓步或構成了自從習近平成為中共新領導人以來的一個重要進展。這個事件顯示中國的社會變得更加桀驁不馴,並願意挑戰黨的權威。 - 大陸政治
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

New Party Leadership Moves in on Strongholds of Old Faction | Regime | 中華人民共和國

New Party Leadership Moves in on Strongholds of Old Faction | Regime | 中華人民共和國 | Chinese Cyber Code Conflict | Scoop.it
The new Chinese Communist Party head and former leader have been hard at work reshuffling key officials to curtail a rival faction.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

在2012年的變化和進步,中國的軍事演習 Changes and progress of China's military exercises in 2012 - People's Daily Online

在2012年的變化和進步,中國的軍事演習 Changes and progress of China's military exercises in 2012 - People's Daily Online | Chinese Cyber Code Conflict | Scoop.it
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

中華人民共和國...China sends fighters to counter Japanese aircraft - China.org.cn

中華人民共和國...China sends fighters to counter Japanese aircraft - China.org.cn | Chinese Cyber Code Conflict | Scoop.it
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

中華人民共和國 ~ Why the US should rein in Japan - China.org.cn

中華人民共和國 ~ Why the US should rein in Japan - China.org.cn | Chinese Cyber Code Conflict | Scoop.it
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

The US intelligence community's New Year's wish

The US intelligence community's New Year's wish | Chinese Cyber Code Conflict | Scoop.it
In recent years, the US intelligence community has been one of Washington's major growth industries.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

[INFOGRAPHIC] The Automated Home of Tomorrow: How Vulnerable is it | Trend Micro Security Intelligence Blog

[INFOGRAPHIC] The Automated Home of Tomorrow: How Vulnerable is it | Trend Micro Security Intelligence Blog | Chinese Cyber Code Conflict | Scoop.it
In this entry, we tackle various potential security risks posed by Internet-enabled devices such as smart TVs, refrigerators, and cars among others.
more...
James's curator insight, March 21, 2013 6:05 AM

An entirely automated and digital life is not necessarily the best one.

Security breaches can lead to safety concerns and electronic failure can be more complicated for an everyman to repair compared to a non-digitalized appliance.

 

Perhaps we're not too far from having a HAL on our hands...

Scooped by Red-DragonRising
Scoop.it!

Cloud Of Iron: DARPA Hardens Cloud Computing Against Cyber Attack

Cloud Of Iron: DARPA Hardens Cloud Computing Against Cyber Attack | Chinese Cyber Code Conflict | Scoop.it
New technology creates new capabilities -- and new vulnerabilities. "Moving to the cloud" is the trend du jour, even in the intelligence world, but the
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Angel Investor Xu Xiaoping Calls for a Freer Chinese Internet

Angel Investor Xu Xiaoping Calls for a Freer Chinese Internet | Chinese Cyber Code Conflict | Scoop.it
Xu Xiaoping speaks out in favor of a less censored web.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Iran Intelligence Ministry - a report by Pentagon and Library of Congress

Iran Intelligence Ministry - a report by Pentagon and Library of Congress | Chinese Cyber Code Conflict | Scoop.it
NCRI - National Council of Resistance of Iran
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Australian Security Intelligence Organisation (ASIO) wants to hack third-party computers to get to their targets

Australian Security Intelligence Organisation (ASIO) wants to hack third-party computers to get to their targets | Chinese Cyber Code Conflict | Scoop.it
ASIO wants to hack into all kinds of devices to further their security interests. According to today's report, the Attorney General's Department...
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Beijing to require ID for cellphone numbers |chinadaily.com.cn

Beijing to require ID for cellphone numbers |chinadaily.com.cn | Chinese Cyber Code Conflict | Scoop.it
Beijing residents will soon need to provide ID when they register a new cellphone number or transfer an old one, authorities said on Wednesday.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Xi Jinping May Take Security Power, China Analyst Believes | Regime | China | Epoch Times

Xi Jinping May Take Security Power, China Analyst Believes | Regime | China | Epoch Times | Chinese Cyber Code Conflict | Scoop.it
In a recent speech Xi Jinping indicated that he may be seeking to take direct control of the security forces.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Chinese Party Censor Posts List of Propaganda Guidelines Online |中華人民共和國

Chinese Party Censor Posts List of Propaganda Guidelines Online |中華人民共和國 | Chinese Cyber Code Conflict | Scoop.it
The publication of a list of propaganda guidelines enforced in China sheds light on the operations of the usually opaque system of media control.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Hacktivists develop cyberwarfare niche -

Hacktivists develop cyberwarfare niche - | Chinese Cyber Code Conflict | Scoop.it
As 2013 comes into full view, I believe the new year may bring cyber events that will have the greatest impact yet on homeland security and foreign policy.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

In pictures: Chinese Marine Corps conduct military training - People's Daily Online

In pictures: Chinese Marine Corps conduct military training - People's Daily Online | Chinese Cyber Code Conflict | Scoop.it
【1】【2】【3】【4】【5】
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

New maps highlight South China Sea islands- 中華人民共和國...China.org.cn

New maps highlight South China Sea islands- 中華人民共和國...China.org.cn | Chinese Cyber Code Conflict | Scoop.it
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Chinese crude imports rise 6.8% in 2012 - China.org.cn

Chinese crude imports rise 6.8% in 2012 - China.org.cn | Chinese Cyber Code Conflict | Scoop.it
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

First Strike: US Cyber Warriors Seize the Offensive...why are they wearing flight suits?

First Strike: US Cyber Warriors Seize the Offensive...why are they wearing flight suits? | Chinese Cyber Code Conflict | Scoop.it
The US has abandoned its previous dependence on defensive cyber strategies and has shifted into high gear with the aim of developing superior first-strike capacities.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

While the cyber war tail wags the national security dog, software security offers a different path to cyber peace

While the cyber war tail wags the national security dog, software security offers a different path to cyber peace | Chinese Cyber Code Conflict | Scoop.it
Richard Power and Gary McGraw talk about BSIMM4, effective application security practices, and "the machine of war"
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

The Irrational, Racist Fear of China ~ 中華人民共和國

The Irrational, Racist Fear of China ~ 中華人民共和國 | Chinese Cyber Code Conflict | Scoop.it
(This article is published here with permission from the author. His bio and links are at the bottom of the article. In sharing this article, he writes, “I am particularly happy that the piec...
more...
No comment yet.